IT Management  >   Systems Operations  >   Security  >  

Managing IT Security

RSS Feed    Add to Google    Add to My Yahoo!
Managing IT SecurityReports
 
Stop Password Sprawl with SaaS Single Sign-On via Active Directory
sponsored by Centrify Corporation
WHITE PAPER: Access this white paper to get a better understanding of the challenges to adopting SaaS applications, hidden costs of SaaS, and security issues with SaaS apps. Read on to learn more about bolstering your cloud security efforts and stopping password sprawl.
Posted: 21 Aug 2014 | Published: 31 Dec 2013

Centrify Corporation

Online Brand Infringement: Where Do You Start?
sponsored by DomainTools
WHITE PAPER: In this informative white paper, discover a new brand monitoring solution that can quickly identify and notify you of any domain registration that possibly infringes on your brand.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

DomainTools

Securing Your Company - Where Do You Start?
sponsored by NEC Corporation of America
PRESENTATION TRANSCRIPT: In this helpful resource, hear from the experts as they examine the best practices and strategies for effectively protecting your enterprise data safe from attackers without compromising any other aspects of the business.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

NEC Corporation of America

Demystifying Security Controls for IT Risk & Audit Professionals
sponsored by Bit9, Inc.
WEBCAST: Although you may be a compliant company, if you disregard security threats and the technologies and tools to protect them, then you are as vulnerable as anyone. Watch this webcast to learn about the risks that face your organization if you don't meet compliance guidelines and how to meet these goals.
Posted: 18 Aug 2014 | Premiered: Aug 18, 2014

Bit9, Inc.

Case Study: Global 100 Manufacturer Reduces Risk Across 30,000 Domains in Eight Days
sponsored by Veracode, Inc.
CASE STUDY: A Global 100 manufacturer has thousands of applications that require continuous security assessments, relying on a legacy program that strained under the volume. View this case study now to see how this manufacturer reduced vulnerabilities by 79% in 8 months, and examined 30,000 domain names and IP addresses immediately.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Veracode, Inc.

Fax Security: Minimizing Breaches and Compliance Risks
sponsored by OpenText
WHITE PAPER: In this in-depth resource, you'll gain critical insights into the best practices and strategies for maintaining process control, information integrity, privacy, and effective archiving for your fax communications.
Posted: 19 Aug 2014 | Published: 31 Dec 2013

OpenText

Enabling Mobile Users and Staying Compliant: How Healthcare Organizations Manage Both
sponsored by BlackBerry
WHITE PAPER: In this white paper, discover a mobile security solution that provides containerization, application-wrapping and secure connectivity to healthcare organizations, helping prevent data breaches and meet compliance regulations.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

BlackBerry

Top 3 Reasons to Give Insiders a Unified Identity
sponsored by Centrify Corporation
WHITE PAPER: This white paper stresses the importance of recognizing the danger of malicious insiders and the potential for breaches caused by employee error or negligence, as well as the top 3 reasons to consider giving insiders a unified identity.
Posted: 20 Aug 2014 | Published: 31 Dec 2013

Centrify Corporation

Advanced Persistent Threats: Expert Strategies for IT Security
sponsored by IBM
WHITE PAPER: This expert E-Guide outlines the best practices for organizations to defend themselves against these malicious attacks and to prevent them before they happen.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

IBM

Security Essentials for CIOs: Enabling Mobility in the Enterprise
sponsored by IBM
WHITE PAPER: This white paper discusses the issues that CIOs must face when dealing with personal and professional identities on mobile devices.
Posted: 26 Aug 2014 | Published: 31 Dec 2012

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement